2024    2023    2022    2021    2020   


   
   


   

Return to the full list of publications for the current year


Check our Open Access Repository.

2020


119 publication(s):

Articles

21 - 
Probabilistic Analysis of Rumor Spreading Time
Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume
INFORMS Journal on Computing, 2020, 32 (1), ⟨hal-01888300v2⟩
DOI : https://doi.org/10.1287/ijoc.2018.0845
PDF file
 Reprint request: Subject to availability
22 - 
Stable relations and abstract interpretation of higher-order programs
Benoît Montagu, Thomas Jensen
Proceedings of the ACM on Programming Languages, 2020, 4 (ICFP), pp.1-30.
DOI : https://doi.org/10.1145/3409001
PDF file
 Reprint request: Subject to availability
23 - 
Watch out! Doxware on the way…
Routa Moussaileb, Renzo Efrain Navas, Nora Cuppens
Journal of information security and applications, 2020, 55, pp.102668.
DOI : https://doi.org/10.1016/j.jisa.2020.102668
PDF file
 Reprint request: Subject to availability
24 - 
Load-Aware Shedding in Stream Processing Systems
Nicolò Rivetti, Yann Busnel, Leonardo Querzoni
Transactions on Large-Scale Data- and Knowledge-Centered Systems, 2020, pp.121-153.
DOI : https://doi.org/10.1007/978-3-662-62386-2_5
PDF file
 Reprint request: Subject to availability
25 - 
Espace public, crise sanitaire et droit pénal (Analyse de l’article L. 3136-1, alinéas 3 et suivants, du Code de la santé publique)
Laurent Rousvoal
Gazette du Palais, 2020, 40, p. 65 et suiv.
 Reprint request: Subject to availability
26 - 
Empirical Assessment of Generating Adversarial Configurations for Software Product Lines
Paul Temple, Gilles Perrouin, Mathieu Acher, Battista Biggio, Jean-Marc Jézéquel, Fabio Roli
Empirical Software Engineering, 2020, 26 (6), pp.1-57.
DOI : https://doi.org/10.1007/s10664-020-09915-7
PDF file
 Reprint request: Subject to availability
27 - 
Knowledge-Based Programs as Succinct Policies for Partially Observable Domains
Bruno Zanuttini, Jérôme Lang, Abdallah Saffidine, François Schwarzentruber
Artificial Intelligence, 2020, 288, pp.103365.
DOI : https://doi.org/10.1016/j.artint.2020.103365
PDF file
 Reprint request: Subject to availability
28 - 
Walking on the Edge: Fast, Low-Distortion Adversarial Examples
Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg
IEEE Transactions on Information Forensics and Security, 2020, 16, pp.701 - 713.
DOI : https://doi.org/10.1109/TIFS.2020.3021899
PDF file
 Reprint request: Subject to availability
29 - 
Smooth adversarial examples
Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg
EURASIP Journal on Information Security, 2020, 2020 (1),
DOI : https://doi.org/10.1186/s13635-020-00112-z
PDF file
 Reprint request: Subject to availability

Book chapters

30 - 
Vers de nouvelles architectures intelligentes pour l’Internet des Véhicules
Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief
Gestion et contrôle intelligents des réseaux, 2020.
 Reprint request: Subject to availability


Export data displayed in CSV Export data displayed in RTF